


default search action
4th InfoSecCD 2007: Kennesaw, Georgia, USA
- Proceedings of the 4th Annual Conference on Information Security Curriculum Development, InfoSecCD 2007, Kennesaw, Georgia, USA, September 28, 2007. ACM 2007, ISBN 978-1-59593-909-8

Pedagogy track
- Robin M. Snyder:

Introducing Python programming into the data communications and security courses. 1:1-1:5 - Robin M. Snyder:

Security programming using Python: man-in-the-middle attacks. 2:1-2:6 - Richard G. Taylor:

Making molehills out of mountains: bringing security research to the classroom. 3:1 - Guillermo Francia III, Brian Estes, Rahjima R. Francia, Vu Nguyen, Alex Scroggins:

The design and implementation of an automated security compliance toolkit: a pedagogical exercise. 4:1 - Mário A. M. Guimarães, Meg Murray, Richard Austin:

Incorporating database security courseware into a database security class. 5:1-5:5 - Richard D. Austin:

Digital forensics on the cheap: teaching forensics using open source tools. 6:1-6:5 - Michael Bowman, Heath D. Brown, Paul Pitt:

An undergraduate rootkit research project: How available? How hard? How dangerous? 7:1-7:6 - Yan Bai, Wayne Summers, Edward Bosworth:

Teaching network risk assessment to online graduate students. 8:1-8:6 - Valerie J. H. Powell, Christopher T. Davis, Randall S. Johnson, Peter Y. Wu, John C. Turchek, Ian W. Parker:

VLabNet: the integrated design of hands-on learning in information security and networking. 9:1-9:7 - Douglas P. Twitchell:

SecurityCom: a multi-player game for researching and teaching information security teams. 10:1
Practice track
- Herbert J. Mattord:

Rethinking risk-based information security. 11:1 - Robert C. Newman:

Covert computer and network communications. 12:1-12:8 - Erwin Louis Carrow:

Puppetnets and botnets: information technology vulnerability exploits that threaten basic internet use. 13:1-13:7 - Wasim A. Al-Hamdani:

Education organization baseline control protection and trusted level security. 14:1 - Randall Craig Reid, Arthur H. Gilbert:

Managing security from the perspective of the business executive. 15:1-15:5 - Kevin S. Floyd, Susan J. Harrington, Prachi Hivale:

The autotelic propensity of types of hackers. 16:1-16:4 - Stephen C. Gay:

An examination of virtualization's role in contingency planning. 17:1-17:8 - Jonathan M. Graefe, Laurel Lashley, Mário A. M. Guimarães, Eghosa Guodabia, Amol K. Gupta, David Henry, Richard Austin:

Credit card transaction security. 18:1-18:6 - Tammy Alexander:

Questionable qualifications: an in-depth look at diploma mills. 19:1-19:7
Student papers track
- Alison Hedrick:

Cyberinsurance: a risk management tool? 20:1-20:4 - Erwin Louis Carrow:

InfoSec technology management of user space and services through security threat gateways. 21:1-21:6 - Andy Green

:
Management of security policies for mobile devices. 22:1-22:4 - Scott Joubert:

Managing data access and voice service for remote workers. 23:1-23:4 - Michael Fabian:

Endpoint security: managing USB-based removable devices with the advent of portable applications. 24:1-24:5 - Godwin Fumey-Nassah:

The management of economic ramification of information and network security on an organization. 25:1-25:4 - Errol A. Blake:

Network and database security: regulatory compliance, network, and database security-a unified process and goal. 26:1 - Errol A. Blake:

Network security: VoIP security on data network-a guide. 27:1-27:7 - Brian C. Boynton:

Identification of process improvement methodologies with application in information security. 28:1-28:5 - Wesley Spencer:

Teaching advanced network security concepts to high school students in a laboratory-based summer camp environment. 29:1-29:7 - Eric S. Imsand, John A. Hamilton Jr.:

Impact of daily computer usage on GUI usage analysis. 30:1-30:9 - Michelle Boatwright, Xin Luo:

What do we know about biometrics authentication? 31:1-31:5 - Dipti Patel, Xin Luo:

Take a close look at phishing. 32:1-32:4

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














